From owner-freebsd-python@freebsd.org  Sat Jun 10 14:23:02 2017
Return-Path: <owner-freebsd-python@freebsd.org>
Delivered-To: freebsd-python@mailman.ysv.freebsd.org
Received: from mx1.freebsd.org (mx1.freebsd.org
 [IPv6:2001:1900:2254:206a::19:1])
 by mailman.ysv.freebsd.org (Postfix) with ESMTP id DFD41BEE811
 for <freebsd-python@mailman.ysv.freebsd.org>;
 Sat, 10 Jun 2017 14:23:02 +0000 (UTC)
 (envelope-from bugzilla-noreply@freebsd.org)
Received: from mailman.ysv.freebsd.org (unknown [127.0.1.3])
 by mx1.freebsd.org (Postfix) with ESMTP id C70F47AC44
 for <freebsd-python@freebsd.org>; Sat, 10 Jun 2017 14:23:02 +0000 (UTC)
 (envelope-from bugzilla-noreply@freebsd.org)
Received: by mailman.ysv.freebsd.org (Postfix)
 id C6690BEE810; Sat, 10 Jun 2017 14:23:02 +0000 (UTC)
Delivered-To: python@mailman.ysv.freebsd.org
Received: from mx1.freebsd.org (mx1.freebsd.org
 [IPv6:2001:1900:2254:206a::19:1])
 by mailman.ysv.freebsd.org (Postfix) with ESMTP id C60E4BEE80F
 for <python@mailman.ysv.freebsd.org>; Sat, 10 Jun 2017 14:23:02 +0000 (UTC)
 (envelope-from bugzilla-noreply@freebsd.org)
Received: from kenobi.freebsd.org (kenobi.freebsd.org
 [IPv6:2001:1900:2254:206a::16:76])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (Client did not present a certificate)
 by mx1.freebsd.org (Postfix) with ESMTPS id B49507AC43
 for <python@FreeBSD.org>; Sat, 10 Jun 2017 14:23:02 +0000 (UTC)
 (envelope-from bugzilla-noreply@freebsd.org)
Received: from bugs.freebsd.org ([127.0.1.118])
 by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id v5AEN2qo040990
 for <python@FreeBSD.org>; Sat, 10 Jun 2017 14:23:02 GMT
 (envelope-from bugzilla-noreply@freebsd.org)
From: bugzilla-noreply@freebsd.org
To: python@FreeBSD.org
Subject: [Bug 217703] lang/python36: Remove BROKEN_SSL for openssl-devel
Date: Sat, 10 Jun 2017 14:23:02 +0000
X-Bugzilla-Reason: CC
X-Bugzilla-Type: changed
X-Bugzilla-Watch-Reason: None
X-Bugzilla-Product: Ports & Packages
X-Bugzilla-Component: Individual Port(s)
X-Bugzilla-Version: Latest
X-Bugzilla-Keywords: 
X-Bugzilla-Severity: Affects Only Me
X-Bugzilla-Who: m.r.sopacua@gmail.com
X-Bugzilla-Status: Closed
X-Bugzilla-Resolution: FIXED
X-Bugzilla-Priority: ---
X-Bugzilla-Assigned-To: sunpoet@FreeBSD.org
X-Bugzilla-Flags: maintainer-feedback+
X-Bugzilla-Changed-Fields: 
Message-ID: <bug-217703-21822-GTGztChBxF@https.bugs.freebsd.org/bugzilla/>
In-Reply-To: <bug-217703-21822@https.bugs.freebsd.org/bugzilla/>
References: <bug-217703-21822@https.bugs.freebsd.org/bugzilla/>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/
Auto-Submitted: auto-generated
MIME-Version: 1.0
X-BeenThere: freebsd-python@freebsd.org
X-Mailman-Version: 2.1.23
Precedence: list
List-Id: FreeBSD-specific Python issues <freebsd-python.freebsd.org>
List-Unsubscribe: <https://lists.freebsd.org/mailman/options/freebsd-python>, 
 <mailto:freebsd-python-request@freebsd.org?subject=unsubscribe>
List-Archive: <http://lists.freebsd.org/pipermail/freebsd-python/>
List-Post: <mailto:freebsd-python@freebsd.org>
List-Help: <mailto:freebsd-python-request@freebsd.org?subject=help>
List-Subscribe: <https://lists.freebsd.org/mailman/listinfo/freebsd-python>,
 <mailto:freebsd-python-request@freebsd.org?subject=subscribe>
X-List-Received-Date: Sat, 10 Jun 2017 14:23:03 -0000

https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D217703

--- Comment #14 from Melvyn Sopacua <m.r.sopacua@gmail.com> ---
Update, for reference:

This is an issue in Python upstream.

Python uses #ifdef OPENSSL_NPN_NEGOTIATED to detect support. This is always
defined in the OpenSSL 1.1 header (as opposed to OpenSSL 1.0.2 and earlier)=
 and
the symbols are guarded by #ifndef OPENSSL_NO_NEXTPROTONEG.

The combo yields Python enabling support, but it not being available.

This has been wrong from Python since the beginning, since the first commit
introducing NPN already defined OPENSSL_NO_NEXTPROTONEG [1], but they've be=
en
able to get away with it till now.

Of course, a variable saying something is not disabled, is a braindead conc=
ept
in OpenSSL general source, as you can't detect if it's disabled if it is not
born yet (in earlier versions).

Working on a patch for upstream.

@koobs I assume separate report if I'd like that patch included in the ports
tree?

[1]
https://github.com/openssl/openssl/commit/68b33cc5c7aa1bb98e95bfb4b61c34192=
a7a50e3

--=20
You are receiving this mail because:
You are on the CC list for the bug.=